General

  • Target

    67b47d5d40255326b157af90553f074fbe47481824e6ccb606a9e492632e517d

  • Size

    2.5MB

  • Sample

    220524-t9zh1ahhf8

  • MD5

    29ee42f0fce2b324a34f6dc8e33a8cbd

  • SHA1

    db80abe24dc383ade94d2064ff27d3371613c48d

  • SHA256

    67b47d5d40255326b157af90553f074fbe47481824e6ccb606a9e492632e517d

  • SHA512

    e2ef5e49d8d11fdc9b5212fb994be58bae6708e400353b3476169f68900786c808e2b6c1d545c2409b179fe5fe051c28be98e7ea5cc9cb97fde2fa1bafe140f1

Malware Config

Extracted

Family

danabot

C2

142.11.240.144

45.153.243.113

88.150.227.95

rsa_pubkey.plain

Targets

    • Target

      67b47d5d40255326b157af90553f074fbe47481824e6ccb606a9e492632e517d

    • Size

      2.5MB

    • MD5

      29ee42f0fce2b324a34f6dc8e33a8cbd

    • SHA1

      db80abe24dc383ade94d2064ff27d3371613c48d

    • SHA256

      67b47d5d40255326b157af90553f074fbe47481824e6ccb606a9e492632e517d

    • SHA512

      e2ef5e49d8d11fdc9b5212fb994be58bae6708e400353b3476169f68900786c808e2b6c1d545c2409b179fe5fe051c28be98e7ea5cc9cb97fde2fa1bafe140f1

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks